this post was submitted on 16 Jul 2024
1 points (100.0% liked)

Technology

58458 readers
4590 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] randomaccount43543@lemmy.world 0 points 2 months ago (1 children)

Do they say what phone it was?

[–] LodeMike@lemmy.today 0 points 2 months ago (2 children)

Yeah my guess is some shitty android.

[–] WallEx@feddit.de 0 points 2 months ago (1 children)
[–] LodeMike@lemmy.today 0 points 2 months ago (1 children)

No, a shitty android (as in one that has a security flaw in it). I use Android lol.

[–] WallEx@feddit.de 0 points 2 months ago (2 children)

Yeah, like an old IOS on an old iPhone, that doesn't get updates anymore?

load more comments (2 replies)
[–] piracysails@lemm.ee 0 points 2 months ago (1 children)

Guys I think they meant from a bad OEM.

[–] LodeMike@lemmy.today 0 points 2 months ago

I did and I said that. A shitty android. If I meant to say that all android are shitty I would have just said "mist-ve been an android"

[–] umbrella@lemmy.ml 0 points 2 months ago (2 children)

stingrays, people.

they sell the exploits and are all hush hush about it.

[–] GamingChairModel@lemmy.world 0 points 2 months ago (2 children)

Stingrays don't do shit for this. That's mostly real time location data focused in by tricking your phone into reporting its location to a fake cell tower controlled by an adversary. That doesn't get into the data in your phone, and even if someone used the fake tower to man in the middle, by default pretty much all of a phone's Internet traffic is encrypted from the ISP.

The world of breaking disk encryption on devices is a completely different line of technology, tools, and techniques.

load more comments (2 replies)
load more comments (1 replies)
[–] Chozo@fedia.io 0 points 2 months ago (5 children)

Without knowing how they got into his phone, this is a non-story that is just a retelling of older stories. For all we know they just took his dead finger and put it on the reader. Or maybe he used the same 4-digit PIN for his debit card or lock box or something else that they were able to recover. Maybe some detective just just randomly entered the shooter's birthday, only to say "Hey sarge, you're never gonna believe this... first try!"

There's nothing useful that can be taken away from this story yet, until more details come out.

[–] 0x0@programming.dev 0 points 2 months ago

they just took his dead finger and put it on the reader.

My bet's on this.

[–] Eggyhead@kbin.run 0 points 2 months ago (2 children)

I’m super curious how they got into his phone

[–] admin@lemmy.my-box.dev 0 points 2 months ago

I think you'll get to hold on to that feeling.

[–] SineNomineAnonymous@lemmy.ml 0 points 2 months ago

"We tried 0000. Tony, write up a press release about how incredible we are at our job and how we spent 400% of our usual overtime on it and send it to the tech press. Make sure they mention we need to triple next year's budget for security and shit."

[–] glowie@h4x0r.host 0 points 2 months ago

Or unknown NGO software was used. But you're right. A nothing burger for now.

[–] xnx@slrpnk.net 0 points 2 months ago (1 children)

Using a dead persons finger is not possible though

[–] Chozo@fedia.io 0 points 2 months ago

I don't see why it wouldn't be. It just checks that the shape of the fingerprint is there, it doesn't check for a pulse or any sign of life. If you have a high-enough resolution image and printer, it's actually rther trivial to bypass most optical fingerprint readers.

load more comments (1 replies)
[–] henfredemars@infosec.pub 0 points 2 months ago (2 children)

Easier is a very relative term. It’ll be really expensive to use a genuine zero-day to do it. Such exploits are few and far between.

[–] catloaf@lemm.ee 0 points 2 months ago (1 children)

But known exploits that have been patched, but not applied because they didn't update their phone, are plentiful enough.

Update your phones. Reboot them regularly, too.

[–] henfredemars@infosec.pub 0 points 2 months ago

This is true, but becoming an increasingly less important factor because devices now ship with automatic updates enabled by default.

Personally, if I had to guess as someone who studies exploits for a living, I’d wager the device isn’t the most recent model and is probably a few years old, so there are likely known unpatchable bootrom or firmware bugs that can be used from their private arsenal without having to risk an actual zero day exploit.

[–] dwindling7373@feddit.it 0 points 2 months ago* (last edited 2 months ago) (1 children)

How is it expensive? It is if it eqates to the zero day becoming of public domain, and this is not the case here. They can say they guessed the password while in fact they exploited some unknown vulnerability...

[–] henfredemars@infosec.pub 0 points 2 months ago (3 children)

Zero days are extremely expensive costing in the millions of dollars even if you’re not publishing exploit details. Just using it is extremely costly because each attempt exposes your bug to the world, which is an opportunity that it could get caught and patched. Android and iPhone both have mechanisms to detect and report crashes which could easily cost you your bug. Plus, on the exploit markets, a bug that hasn’t been used is worth more because there have been literally zero days of opportunity to defend against it.

There is definitely a cost to using something that expensive and that requires a necessary level of risk. You’ve got to be worth it, and the supply of such bugs is extremely low and sometimes zero depending on your exact software version.

[–] SineNomineAnonymous@lemmy.ml 0 points 2 months ago (1 children)

to be fair to the incompetent people in law enforcement, I do believe "trying to kill a presidential candidate slated to win and being a millimeter away from getting it done" would justify relying on a 0-day.

load more comments (1 replies)
load more comments (2 replies)
[–] autotldr@lemmings.world 0 points 2 months ago

This is the best summary I could come up with:


Just two days after the attempted assassination at former President Donald Trump’s rally in Butler, Pennsylvania, the FBI announced it “gained access” to the shooter’s phone.

Cooper Quintin, a security researcher and senior staff technologist with the Electronic Frontier Foundation, said that law enforcement agencies have several tools at their disposal to extract data from phones.

The bureau famously butted heads with Apple in late 2015 after the company refused to help law enforcement get around the encryption on the San Bernardino, California shooter’s iPhone.

Early in the following year, Apple refused a federal court order to help the FBI access the shooter’s phone, which the company said would effectively require it to build a backdoor for the iPhone’s encryption software.

“The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor,” Cook wrote.

Riana Pfefferkorn, a research scholar at the Stanford Internet Observatory, said the Pensacola shooting was one of the last times federal law enforcement agencies loudly denounced encryption.


The original article contains 1,208 words, the summary contains 180 words. Saved 85%. I'm a bot and I'm open source!

[–] anlumo@lemmy.world 0 points 2 months ago

I’m pretty sure it used to be easier with phones that didn’t have full disk encryption.

[–] sturmblast@lemmy.world 0 points 2 months ago (3 children)

Don't do illegal things on your phone :)

[–] dumbass@leminal.space 0 points 2 months ago (1 children)
[–] ivanafterall@lemmy.world 0 points 2 months ago

THAT'S MY PURSE! I DON'T KNOW YOU!

[–] TheGrandNagus@lemmy.world 0 points 2 months ago

Just because of that I'm gonna do illegal things even harder

load more comments (1 replies)
[–] 0x0@programming.dev 0 points 2 months ago

The article does mention Cellebrite.

[–] TheReturnOfPEB@reddthat.com 0 points 2 months ago* (last edited 2 months ago) (6 children)

Our local sheriff is using some spy level shit in our county that he refuses to explain.

He keeps "happening" upon crimes just "on accident." yesterday it was "stopped to take a pee in public park and caught a baddie" and two days before that it was "just happen to follow and pull over a guy with lots of pounds of pot hidden in the car."

The US police are spying on Americans phones, internet, GPS, and everything with no judicial recourse because it is corporations spying and then "giving the info" to the police for money.

The US law enforcement has gone full STAZI but using capitalism as additional cover.

The US is dead.

[–] rottingleaf@lemmy.world 0 points 2 months ago (1 children)

Let's all apologize to Stallman.

[–] demonsword@lemmy.world 0 points 2 months ago (1 children)

the man has rarely been proven wrong in anything tech related he has said

[–] TimeSquirrel@kbin.melroy.org 0 points 2 months ago (3 children)

Good thing you put the "tech related" qualifier on there. He probably should have stayed in that lane.

[–] TheGrandNagus@lemmy.world 0 points 2 months ago

Indeed.

It's also a reminder of why we shouldn't mindlessly celebrate celebrity figures like they're deities.

Stallman has amazing views regarding FOSS, but yeah, some of his other opinions are... interesting.

load more comments (2 replies)
[–] phoenixz@lemmy.ca 0 points 2 months ago (1 children)

Mind telling us which sherrif this is?

[–] Lumisal@lemmy.world 0 points 2 months ago

I think it's the one in New York named Spyder Mann

[–] remer@lemmy.world 0 points 2 months ago (1 children)
load more comments (1 replies)
[–] xnx@slrpnk.net 0 points 2 months ago

Do you have an article on this?

[–] USSEthernet@startrek.website 0 points 2 months ago

They're probably just capturing SMS messages or regular calls. Which is still illegal without a warrant, but who watches the watchers? Use encrypted chats and encrypted calls if you're worried.

load more comments (1 replies)
[–] bdonvr@thelemmy.club 0 points 2 months ago (1 children)

Good chance it was just putting the dead dudes finger on the scanner lmao

[–] xnx@slrpnk.net 0 points 2 months ago (1 children)
[–] bdonvr@thelemmy.club 0 points 2 months ago (2 children)

Unless disabled by timeout, restart, or otherwise manually I'm curious to know why that would be?

[–] willsenior@lemm.ee 0 points 2 months ago (3 children)

It is hit or miss. The fingerprint button is also looking for the electrical signals of a living person. Apparently, that doesn't end immediately upon death.

[–] ArcaneSlime@lemmy.dbzer0.com 0 points 2 months ago

Eh so you stick a 9v to the back of the finger, whatevs.

[–] BigFatNips@sh.itjust.works 0 points 2 months ago (2 children)

Source? Sounds like scifi movie stuff to me, but I'd be interested to read/see more about it

[–] CoolGirl586@lemmy.world 0 points 2 months ago (4 children)

Your body doesn't all die at once. The parts that need a constant flow of oxygen die within minutes, while some parts take hours. Tissues like skin, tendons and heart valves are viable for harvest for as long as 48 hours after death.

https://australian.museum/about/history/exhibitions/death-the-last-taboo/decomposition-body-changes/

load more comments (4 replies)
load more comments (1 replies)
load more comments (1 replies)
load more comments (1 replies)
[–] Sam_Bass@lemmy.world 0 points 2 months ago

Sif that hasnt been the case for 20 years? Heh

load more comments
view more: next ›